home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page468.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  110KB  |  817x1045  |  8-bit (256 colors)
Labels: bulletin board | cell phone | hakham | laptop | monitor | plaything | sky
OCR: 400 CHAPTER SECTION E Web and E-mail Security THE WEB AND E-MAIL abound with weds and scams engineered to monitor your online activities and collect confidential information such as credit card numbers, passwords, and bank account numbers You were introduced to spyware in an earlier chapter Now you'll learn about specific spam and spyware exploits and find out how to minimize the risk they pose to computer security and your privacy. COOKIE EXPLOITS Can cookies be security risk? Cookies have built-in safeguards designed to reduce their abuse but marketers, hackers, and pranksters have discovered loopholes that twist cookies to serve the daep side. One of the most prevalent cookie exploits involves ad-serving cookies and Flash cookies pose another potential threat What is an ad-serving cooki ...